Essays about: "technical threats"
Showing result 1 - 5 of 70 essays containing the words technical threats.
-
1. Improving Email Security in Organizations : Solutions and Guidelines
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Data breaches from email attacks have been an issue since email was first implemented. Common attack methods like phishing are still a threat to organizations to this very day. That is because it never seems to stop evolving and keeps becoming more and more convincing. READ MORE
-
2. A investigative study of social security in Hammarby Sjöstad
University essay from KTH/Urbana och regionala studierAbstract : The conducted study has illuminated and examined Hammarby Sjöstad district administration's strategic use of the concept of "security" as a central part of their overall sustainability efforts. Hammarby Sjöstad, a prominent neighborhood in Stockholm, has established itself as an exemplary example of how urban development can integrate sustainability, environmental awareness, and quality of life. READ MORE
-
3. The Digitalization of the Electricity System : Impact Assessment of Digital Technologies on the Electricity System and its Main Stakeholders
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This work explores the state of digitalization of the European electricity sector and assesses the impacts of digital technologies on the electricity system and its main stakeholders. Digital technologies, such as smart meters and 5G connectivity, represent a powerful tool for system operators to face the new challenges brought about by the decarbonization of the energy sector. READ MORE
-
4. Adversarial Machine (Deep) Learning-basedRobustification in 5G Networks
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : A significant development in wireless communication and artificial intelligence has been made possible by the combination of 5G networks with deep learning methods. This paper explores the complex interactions between these areas, concentrating on the dangers that adversarial attacks represent in the context of 5G network slicing. READ MORE
-
5. The social production of vulnerabilities online : A Tale about digitalised disaster
University essay from FörsvarshögskolanAbstract : This thesis aims to display how disastrous events in the cyber domain can be understood to have root causes attributed to non-technical vulnerabilities. The goal is to show the accelerating importance in understanding the cyber domain as any other societal arena. READ MORE